Posted on 01/07/2008 1:29:55 PM PST by TomServo
what kind of total and complete freaking idiot would connect the controls of an airplane to the internet???!?!?!
Hello? Communist China?? Al Qaeda?? Would you like to crash some planes and kill some Americans???
Nothing to worry about. I hear all those computers are running Vista.
I wouldn't call the problem an "oops", since it has been recognized and will be dealt with long before the first 787 ever boards its first passenger.
my first thought exactly..the article states the two networks aren’t “completely connected”, but a saavy hacker doesn’t need a complete connection, only a tidbit to get him/her where they want to go. whoever designed this should be redeployed..
Sure I’d call it an oops...
It’s not like I called it, “We’re all gonna DIE!!!”
ROFL..
“Do you wish to take off? yes or no”
“Do you wish to serve fish? yes or no”
“Do you wish to crash the plane? yes or no”
Bunch of self-styled experts looking for publicity.
OK, good point. :-)
;-)
Can you imagine, "Hey ma, hold ma beer. Ya'll ain't gonna believe this one!"
“This copy Windows is not genuine, please contact Microsoft to reactivate your copy of Windows. Our normal business hours are...”
“This copy of Windows is not genuine, please contact Microsoft to reactivate your copy of Windows. Our normal business hours are...”
“what kind of total and complete freaking idiot would connect the controls of an airplane to the internet???!?!?!”
Story says there is a firewall. Its not connected and sounds like a security expert wasn’t used in the design. This is a simple fix.
Those control systems already have connectivity outside of the plane. So they are currently hackable through the corporate networks.
Forget passengers being able to take control. A computer geek in his basement could do it, if what they are contending is true (I suspect not).
And it's a good thing too, with my Flight Simulator setup I've got much more experience than any airline pilot.
I get do-overs with landings don't I?
A corporate network architect who is thinking about what the two computer systems need to talk to and not what the two computer systems are doing. Both systems need to connect the real world at some point, so you put them through the same point. It only becomes a problem when you contemplate what system A does and who might be accessing system B.
This system is 100% secure and safe.
I don’t want to get specific but someone searching my past posts could infer how I know. Rest assured that I know more about this system than anyone quoted in that story.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.